Search Results - "Sathiyamoorthy, E."

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases by Narayan, Subhashini, Sathiyamoorthy, E.

    Published in Neural computing & applications (01-01-2019)
    “…Recently, using of the intelligent technologies in the field of clinical decision making is increased rapidly to improve the lifestyles of patients and to help…”
    Get full text
    Journal Article
  2. 2

    MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment by Jagadeesh, G., Gitanjali, J., Vellingiri, J., Pounambal, M., Sathiyamoorthy, E., Iwendi, Celestine

    Published in The Journal of supercomputing (01-05-2024)
    “…Securing confidential data against unauthorized users leads to access control policies with the rapid progression of Internet of Things (IoT) devices. Because…”
    Get full text
    Journal Article
  3. 3

    A Comparative study about Workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environment by R, Yuvha, E, Sathiyamoorthy

    Published in EAI endorsed transactions on energy web (01-09-2020)
    “…Auto-scaling systems help provisioning resources on demand which helps tap into the elastic nature of the cloud. Theapplications hosted on the cloud tend to…”
    Get full text
    Journal Article
  4. 4

    Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective by Jagadeesh, G., Pounambal, M., ArivuSelvan, K., Sathiyamoorthy, E., Vellingiri, J., Madhu Viswanatham, V., Iwendi, Celestine

    Published in Signal, image and video processing (01-07-2024)
    “…As the Industrial Internet of Things (IIoT) continues to advance, ensuring robust data privacy in data aggregation processes becomes paramount. This paper…”
    Get full text
    Journal Article
  5. 5

    A new trust-based mechanism for detecting intrusions in MANET by K, Anusha, E, Sathiyamoorthy

    Published in Information security journal. (04-07-2017)
    “…Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and demanding task. It is important to secure the network against intrusions in MANET for…”
    Get full text
    Journal Article
  6. 6

    OMAMIDS: Ontology Based Multi-Agent Model Intrusion Detection System for Detecting Web Service Attacks by Anusha, K., Sathiyamoorthy, E.

    Published in Journal of applied security research (01-10-2016)
    “…Web service plays a significant role in the Internet applications. According to the current researchers, the web services are highly prone to the…”
    Get full text
    Journal Article
  7. 7

    A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID by Manivannan, S. S., Sathiyamoorthy, E.

    “…Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking…”
    Get full text
    Journal Article
  8. 8

    Privacy Preservation of a Group and Secure Data Storage in Cloud Environment by Govinda, K., Sathiyamoorthy, E.

    “…Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that…”
    Get full text
    Journal Article
  9. 9

    Comparative study for feature selection algorithms in intrusion detection system by Anusha, K., Sathiyamoorthy, E.

    “…The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and…”
    Get full text
    Journal Article
  10. 10

    A novel and efficient key sharing technique for web applications by Vincent, P. M. Durai Raj, Sathiyamoorthy, E.

    “…Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using…”
    Get full text
    Conference Proceeding
  11. 11

    Agent Based Trust Management Model Based on Weight Value Model for Online Auctions by Sathiyamoorthy, E, Iyenger, N. Ch. Sriman Narayana, Ramachandran, V

    Published 05-04-2010
    “…International Journal of Network Security & Its Applications 1.3 (2009) 15-31 This paper is aimed at the stipulations which arise in the traditional online…”
    Get full text
    Journal Article
  12. 12

    Spatially adaptive illumination modeling for background subtraction by Paruchuri, J. K., Sathiyamoorthy, E. P., Cheung, S. S., Chung-Hao Chen

    “…Background subtraction is important for many vision applications. Existing techniques can adapt to gradual changes in illumination but fail to cope with sudden…”
    Get full text
    Conference Proceeding